Michael Schwarz

Orcid: 0000-0001-6744-3410

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Graz University of Technology, Austria (former)


According to our database1, Michael Schwarz authored at least 77 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CacheWarp: Software-based Fault Injection using Selective State Reset.
Proceedings of the 33rd USENIX Security Symposium, 2024

Efficient and Generic Microarchitectural Hash-Function Recovery.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report).
CoRR, 2023

(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels.
Proceedings of the 32nd USENIX Security Symposium, 2023

Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
Proceedings of the 32nd USENIX Security Symposium, 2023

Practical Timing Side-Channel Attacks on Memory Compression.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors.
Proceedings of the Financial Cryptography and Data Security, 2023

Reviving Meltdown 3a.
Proceedings of the Computer Security - ESORICS 2023, 2023

Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023

A Rowhammer Reproduction Study Using the Blacksmith Fuzzer.
Proceedings of the Computer Security - ESORICS 2023, 2023

FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
HyperDbg: Reinventing Hardware-Assisted Debugging.
CoRR, 2022

SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems.
CoRR, 2022

AMD Prefetch Attacks through Power and Time.
Proceedings of the 31st USENIX Security Symposium, 2022

Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
Proceedings of the 31st USENIX Security Symposium, 2022

Rapid Prototyping for Microarchitectural Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Proceedings of the 31st USENIX Security Symposium, 2022

Finding and Exploiting CPU Features using MSR Templating.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Browser-Based CPU Fingerprinting.
Proceedings of the Computer Security - ESORICS 2022, 2022

Robust and Scalable Process Isolation Against Spectre in the Cloud.
Proceedings of the Computer Security - ESORICS 2022, 2022

CPU Port Contention Without SMT.
Proceedings of the Computer Security - ESORICS 2022, 2022

Branch Different - Spectre Attacks on Apple Silicon.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

HyperDbg: Reinventing Hardware-Assisted Debugging.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Domain Page-Table Isolation.
CoRR, 2021

Dynamic Process Isolation.
CoRR, 2021

Osiris: Automated Discovery of Microarchitectural Side Channels.
Proceedings of the 30th USENIX Security Symposium, 2021

PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Speculative Dereferencing: Reviving Foreshadow.
Proceedings of the Financial Cryptography and Data Security, 2021

Specfuscator: Evaluating Branch Removal as a Spectre Mitigation.
Proceedings of the Financial Cryptography and Data Security, 2021

Automating Seccomp Filter Generation for Linux Applications.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

2020
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks.
IEEE Secur. Priv., 2020

Malware Guard Extension: abusing Intel SGX to conceal cache attacks.
Cybersecur., 2020

Speculative Dereferencing of Registers: Reviving Foreshadow.
CoRR, 2020

Meltdown: reading kernel memory from user space.
Commun. ACM, 2020

Spectre attacks: exploiting speculative execution.
Commun. ACM, 2020

Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86.
Proceedings of the 29th USENIX Security Symposium, 2020

Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis.
Proceedings of the 29th USENIX Security Symposium, 2020

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

ConTExT: A Generic Approach for Mitigating Spectre.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Nethammer: Inducing Rowhammer Faults through Network Requests.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

KASLR: Break It, Fix It, Repeat.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Fallout: Reading Kernel Writes From User Space.
CoRR, 2019

ConTExT: Leakage-Free Transient Execution.
CoRR, 2019

Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs.
CoRR, 2019

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

A Systematic Evaluation of Transient Execution Attacks and Defenses.
Proceedings of the 28th USENIX Security Symposium, 2019

SGXJail: Defeating Enclave Malware via Confinement.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NetSpectre: Read Arbitrary Memory over Network.
Proceedings of the Computer Security - ESORICS 2019, 2019

Practical Enclave Malware with Intel SGX.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Page Cache Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Fallout: Leaking Data on Meltdown-resistant CPUs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

ZombieLoad: Cross-Privilege-Boundary Data Sampling.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

NetSpectre: Read Arbitrary Memory over Network.
CoRR, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Human computation for constraint-based recommenders.
J. Intell. Inf. Syst., 2017

KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks.
CoRR, 2017

Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Proceedings of the Financial Cryptography and Data Security, 2017

KASLR is Dead: Long Live KASLR.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Proceedings of the Computer Security - ESORICS 2017, 2017

Malware Guard Extension: Using SGX to Conceal Cache Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Human Computation Based Acquisition of Financial Service Advisory Practices.
Proceedings of the 1st International Workshop on Personalization & Recommender Systems in Financial Services, 2015

2014
Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014


  Loading...